Nothing Special   »   [go: up one dir, main page]

CN111931230A - Data authorization method and device, storage medium and electronic device - Google Patents

Data authorization method and device, storage medium and electronic device Download PDF

Info

Publication number
CN111931230A
CN111931230A CN202010676178.3A CN202010676178A CN111931230A CN 111931230 A CN111931230 A CN 111931230A CN 202010676178 A CN202010676178 A CN 202010676178A CN 111931230 A CN111931230 A CN 111931230A
Authority
CN
China
Prior art keywords
authorization
data
authorized
result
results
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010676178.3A
Other languages
Chinese (zh)
Inventor
朱江
贺虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN202010676178.3A priority Critical patent/CN111931230A/en
Publication of CN111931230A publication Critical patent/CN111931230A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a data authorization method and device, a storage medium and an electronic device, wherein the method comprises the following steps: receiving a first authorization request initiated by a client, wherein the first authorization request is used for requesting authorization of data to be authorized; responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one; and sending first indication information to the client, wherein the first indication information is used for indicating an authorization result of the data to be authorized, which is determined according to the multiple reference authorization results. The method and the device solve the problem that the data authorization mode in the related technology is poor in scheme applicability due to the fact that the data authorization mode is only suitable for a single-party authorization scene.

Description

Data authorization method and device, storage medium and electronic device
Technical Field
The present application relates to the field of internet, and in particular, to a data authorization method and apparatus, a storage medium, and an electronic apparatus.
Background
In order to protect the private data and manage the digital certificate, the private data and the digital certificate need to be authorized by the related party when in use. Regarding the authorization scenario of private data protection and digital certificate management, a single-party authorization scheme is generally adopted in the related art.
For example, an authorization system for entity identification and trusted data based on block chain is provided in the related art, and the system can carry trusted mapping of real identity of entity object (person or thing) and identity on chain, and realize secure access authorization and data exchange between entity objects. The system comprises two major modules: distributed identity module and verifiable digital credential module:
1) distributed identity module
The distributed identity module realizes a set of distributed multi-center identity protocol which is in accordance with W3C DID specification on a platform at the bottom of a alliance chain, so that the real identity of an entity (a person or an object) realizes the identity on the chain. Meanwhile, the distributed identity module gives the Subject the ability to directly own and control the own identity ID.
2) Verifiable digital certificate module
In the real world, there are various data describing the identity of entities and relationships between entities, such as identification cards, driving licenses, proof of deposit, prescriptions, graduation certificates, property certificates, etc. The verifiable digital certificate module provides a whole set of solution based on the W3C VC specification, and aims to standardize and electronize the data and generate verifiable and exchangeable certificates.
However, the above data authorization method is only applicable to a single-party authorization scenario, and has a problem of poor applicability.
Therefore, the data authorization method in the related art has a problem of poor applicability of the scheme due to the fact that the data authorization method is only applicable to a single-party authorization scenario.
Disclosure of Invention
The application provides a data authorization method and device, a storage medium and an electronic device, which are used for at least solving the problem that the data authorization mode in the related technology has poor scheme applicability caused by the fact that the data authorization mode is only suitable for a single-party authorization scene.
According to an aspect of an embodiment of the present application, there is provided a data authorization method, including: receiving a first authorization request initiated by a client, wherein the first authorization request is used for requesting authorization to data to be authorized; responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing the data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one; and sending first indication information to the client, wherein the first indication information is used for indicating an authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
Optionally, before the obtaining of the multiple reference authorization results of the multiple authorizers, the method further includes: extracting a target data name of the data to be authorized and a target data identifier of the data to be authorized from the first authorization request; and determining the multiple authorized parties according to the target data name and the target data identifier.
Optionally, the determining the multiple authorized parties according to the target data name and the target data identifier includes: and matching the multiple authorized parties from a target relational database by using the target data name and the target data identifier, wherein the target relational database stores the corresponding relationship among the data name, the data identifier and the authorized parties.
Optionally, the obtaining the multiple reference authorization results of the multiple authorizers includes: respectively sending a second authorization request to each of the multiple authorizers, wherein the second authorization request is used for requesting authorization to the data to be authorized; and respectively receiving the reference authorization result returned by each of the multiple authorizers.
Optionally, before the sending the first indication information to the client, the method further includes: determining an authorization result of the data to be authorized according to the multiple reference authorization results; and generating the first indication information according to the authorization result of the data to be authorized.
Optionally, the determining, according to the multiple reference authorization results, an authorization result of the data to be authorized includes at least one of: determining a first authorization result of the data to be authorized under the condition that the reference authorization results all represent that the data to be authorized is allowed to be authorized, wherein the first authorization result is used for representing that the data to be authorized is successfully authorized; determining a second authorization result of the data to be authorized under the condition that at least one reference authorization result in the plurality of reference authorization results indicates that the data to be authorized is not allowed to be authorized, wherein the second authorization result is used for indicating that the data to be authorized fails to be authorized; under the condition that at least one reference authorization result in the plurality of reference authorization results indicates that the data to be authorized is not allowed to be authorized, calculating an authorization probability with the data to be authorized according to the plurality of reference authorization results and a weight corresponding to each authorizing party in the plurality of authorizing parties, wherein the authorization probability is a probability that the data to be authorized is allowed to be authorized; determining a third authorization result of the data to be authorized under the condition that the authorization probability is greater than or equal to a target probability threshold, wherein the third authorization result is used for indicating that the authorization of the data to be authorized is successful; and determining a fourth authorization result of the data to be authorized under the condition that the authorization probability is smaller than a target probability threshold, wherein the fourth authorization result is used for indicating that the data to be authorized fails to be authorized.
Optionally, after receiving the first authorization request initiated by the client, the method further includes: carrying out validity check on the data to be authorized, and obtaining a check result of the data to be authorized; and sending second indication information to the client under the condition that the verification result is used for indicating that the data to be authorized is not verified, wherein the second indication information is used for indicating that the data to be authorized is not verified.
According to another aspect of the embodiments of the present application, there is provided a data authorization apparatus, including: the device comprises a receiving unit, a sending unit and a receiving unit, wherein the receiving unit is used for receiving a first authorization request initiated by a client, and the first authorization request is used for requesting authorization to data to be authorized; an obtaining unit, configured to respond to the first authorization request, and obtain multiple reference authorization results of multiple authorizers, where each authorizer of the multiple authorizers is configured to authorize the data to be authorized, and the multiple authorizers correspond to the multiple reference authorization results one to one; a first sending unit, configured to send first indication information to the client, where the first indication information is used to indicate an authorization result of the to-be-authorized data determined according to the multiple reference authorization results.
Optionally, the apparatus further comprises: an extracting unit, configured to extract a target data name of the to-be-authorized data and a target data identifier of the to-be-authorized data from the first authorization request before the obtaining of the multiple reference authorization results of the multiple authorizers; a first determining unit, configured to determine the multiple authorized parties according to the target data name and the target data identifier.
Optionally, the first determining unit includes: and the matching module is used for matching the multiple authorized parties from a target relational database by using the target data name and the target data identifier, wherein the target relational database stores the corresponding relationship among the data name, the data identifier and the authorized parties.
Optionally, the obtaining unit includes: a sending module, configured to send a second authorization request to each of the multiple authorizers, where the second authorization request is used to request authorization of the to-be-authorized data; a receiving module, configured to receive the reference authorization result returned by each of the multiple authorizers.
Optionally, the apparatus further comprises: a second determining unit, configured to determine, according to the multiple reference authorization results, an authorization result of the to-be-authorized data before sending the first indication information to the client; and the generating unit is used for generating the first indication information according to the authorization result of the data to be authorized.
Optionally, the second determination unit comprises at least one of: the first determining module is used for determining a first authorization result of the data to be authorized under the condition that the plurality of reference authorization results all represent that the data to be authorized is allowed to be authorized, wherein the first authorization result is used for representing that the data to be authorized is successfully authorized; a second determining module, configured to determine a second authorization result of the data to be authorized when at least one reference authorization result of the multiple reference authorization results indicates that authorization of the data to be authorized is not allowed, where the second authorization result is used to indicate that authorization of the data to be authorized fails; a calculation module, configured to calculate an authorization probability for the data to be authorized according to the multiple reference authorization results and a weight corresponding to each of the multiple authorizers when at least one of the multiple reference authorization results indicates that authorization for the data to be authorized is not allowed, where the authorization probability is a probability that authorization for the data to be authorized is allowed; a third determining module, configured to determine a third authorization result of the data to be authorized when the authorization probability is greater than or equal to a target probability threshold, where the third authorization result is used to indicate that the authorization of the data to be authorized is successful; a fourth determining module, configured to determine a fourth authorization result of the data to be authorized when the authorization probability is smaller than a target probability threshold, where the fourth authorization result is used to indicate that the data to be authorized fails to be authorized.
Optionally, the apparatus further comprises: the verification unit is used for verifying the legality of the data to be authorized after receiving a first authorization request initiated by the client, and verifying the result of the verification of the data to be authorized; and a second sending unit, configured to send second indication information to the client when the check result is used to indicate that the to-be-authorized data fails to be checked, where the second indication information is used to indicate that the to-be-authorized data fails to be checked.
According to a further aspect of an embodiment of the present application, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is configured to perform the steps of any of the above method embodiments when executed.
According to a further aspect of an embodiment of the present application, there is also provided an electronic apparatus, including a memory and a processor, the memory storing a computer program therein, the processor being configured to execute the computer program to perform the steps in any of the above method embodiments.
In the embodiment of the application, a multi-party combined authorization mode is adopted, and a first authorization request initiated by a client is received, wherein the first authorization request is used for requesting authorization of data to be authorized; responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one; the method comprises the steps of sending first indication information to a client, wherein the first indication information is used for indicating an authorization result of data to be authorized, which is determined according to a plurality of reference authorization results, the data to be authorized (such as private data, digital certificates and digital assets) are authorized jointly by a plurality of authorized parties, so that the method can be applied to a scene needing multi-party joint authorization, and the multi-party joint authorization can also improve the safety of data authorization, thereby realizing the technical effects of improving the applicability of a data authorization scheme and improving the safety of data authorization, and further solving the problem that the scheme applicability is poor due to the fact that a data authorization mode in the related art is only applicable to a scene with single-party authorization.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic diagram of a hardware environment for a data authorization method according to an embodiment of the application;
FIG. 2 is a flow chart of an alternative data authorization method according to an embodiment of the present application;
FIG. 3 is a flow diagram of an alternative method of single party authorization according to an embodiment of the present application;
FIG. 4 is a flow diagram of another alternative data authorization method according to an embodiment of the application;
FIG. 5 is a schematic diagram of an alternative data authorization apparatus according to an embodiment of the present application;
fig. 6 is a block diagram of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, partial nouns or terms appearing in the description of the embodiments of the present application are applicable to the following explanations:
1. federation
The alliance means that: the block chain business group is composed of a plurality of members, and the alliance members are used as participants to participate in the building of the block chain network.
2. Group of people
The group means: and deploying a main body of the distributed identity system in the groups, wherein each group has a supervisor of the group, and the supervisor has the super key of the group.
3. Monitoring and managing method
The supervisor is as follows: the industry supervision unit to which the organization deploying the distributed identity system belongs has supervision authority over the operation and data of the distributed identity system in the group.
4. Federation chain
The federation chain refers to: there are several organizations involved in managing the chain of blocks of permissions. Each organization operates one or more nodes, the data of which only allows different organizations within the system to read, write and send transactions, and together record transaction data.
5. Intra-group federation chain
The group alliance chain is as follows: only deployed in a federation within a group.
6. Open federation chain
The liberty alliance chain means: a federation chain of authorized data interactions may be conducted among different organizations/institutions/groups.
7、DID
Decentralized identifiers, distributed ID, in a distributed identity system, are used to represent unique identities of entities (entities, representing people, organizations, things, etc.). The DID identification specification may be: the dids are net-id and uuid for short.
8、DID Document
The DID archive is used for describing DID characteristics, and a group of data sets conforming to the [ JSON-LD ] standard comprise data information such as public keys, certificates, services and the like corresponding to the DID, but the DID archive does not contain specific attributes or characteristic data of entities corresponding to the DID, such as names, certificate numbers, contact phones and the like.
9、DID Data
The DID data represents detailed attributes or characteristics of an entity corresponding to the DID, for example, data conforming to the JSON standard such as a name, a certificate number, and a contact phone. The DID Data structure is required to conform to the DID Data Schema definition.
10、DID Data Schema
The DID Data template is stored on the chain and is completely disclosed, and defines information such as Data type, attribute definition, KYC level and the like of the DID Data.
11、DID Credential
The DID identity certificate is a verifiable electronic certificate which is provided by an organization or an individual who joins the distributed identity system and is used for proving the identity of the DID entity.
12、DID Credential Schema
The DID identity certificate template is a verifiable electronic certificate provided by an organization or an individual joining the distributed identity system and used for proving the identity of the DID entity.
13、Claim
Claim means: and the structured Data which is published by the Issuer according to the DID Data Schema definition and is related to the entity corresponding to the DID.
14、Issuer
Issuer means: the publisher of DID credit.
15、Verifier
The Verifier means: and a verifier for verifying the authenticity of the DID Credential.
16、Holder
Holder means: the Holder who has issued the DID credit applies for the issuance of the DID credit from the Issuer and provides the same to the Verifier for verification, and generally, the Holder is an entity represented by the DID in the DID credit.
17. W3C Decentralized Identities (DIDs) v1.0 Specification: W3C organizes the issued distributed ID specification.
18. W3C Verifiable creatives Data Model 1.0 Specification: W3C organizes the promulgated verifiable credential data model specifications.
19. Participating roles
1) Personal entity
The personal entity means: and the individual is used as a DID registration entity, and the individual identity information can be maintained and the identity information authorization can be carried out through the C-terminal Client.
2) Organization entity
The organization entity is as follows: the organization is used as a DID registration entity, and identity information of enterprises or organizations can be maintained and authorized through the Client at the B terminal.
3) Group organization
The group organization means: the owner of the distributed identity system platform in the group and the participant of the open distributed identity system. The group organization DID is a system DID of the distributed identity system in the group. Group organizations are also administrative organizations.
4) Management organization
The management organization means: the organization participating in the platform operation can maintain and use the identity information of the personal entity and the organization entity in the business field, and can issue and verify the identity certificate. The authority can maintain authority of its branches and its users, the authority itself is also the entity of the authority, its users of the authority are also the personal entities.
5) Monitoring and managing method
Each group has a unique supervisor, the supervisor has the super key of the group, and the data unlimited query operation in the group system can be carried out through the supervision Client.
20. And (3) joint authorization: authorization by multiple parties in a joint may include, but is not limited to, one of the following scenarios:
1) when the owner of the data and the digital certificate is a plurality of parties, a scenario that all parties need to jointly authorize is provided;
2) when the owner of the data and the digital certificate is a single party, a scene of joint authorization of the owner and a third party is needed;
3) when the owner of the data and the digital certificate is a plurality of parties, the scenario of joint authorization of all the parties of the owner and a third party is needed. Third parties herein include, but are not limited to, supervisors, regulatory agencies, system operators, and the like. Federated authorization may devise an authorizer level mechanism.
21. Authorizer weight
The authorizer weight defines the weight of multiple authorizers, and the weights of different authorizers may be the same or different.
According to one aspect of the embodiments of the present application, a data authorization method is provided. Alternatively, in the present embodiment, the data authorization method may be applied to a hardware environment formed by the terminal 101 and the server 103 as shown in fig. 1. As shown in fig. 1, a server 103 is connected to a terminal 101 through a network, which may be used to provide services (such as game services, application services, etc.) for the terminal or a client installed on the terminal, and a database may be provided on the server or separately from the server for providing data storage services for the server 103, and the network includes but is not limited to: the terminal 101 is not limited to a PC, a mobile phone, a tablet computer, and the like. The data authorization method in the embodiment of the present application may be executed by the server 103, or may be executed by the terminal 101, or may be executed by both the server 103 and the terminal 101. The terminal 101 executing the data authorization method according to the embodiment of the present application may also be executed by a client installed thereon.
Fig. 2 is a flowchart of an alternative data authorization method according to an embodiment of the present application, and as shown in fig. 2, the method may include the following steps:
step S202, receiving a first authorization request initiated by a client, wherein the first authorization request is used for requesting authorization of data to be authorized;
step S204, responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing the data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one by one;
step S206, first indication information is sent to the client, wherein the first indication information is used for indicating the authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
Through the steps S202 to S206, a first authorization request initiated by the client is received, where the first authorization request is used to request authorization of data to be authorized; responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one; the first indication information is sent to the client, wherein the first indication information is used for indicating the authorization result of the data to be authorized, which is determined according to the multiple reference authorization results, so that the problem that the data authorization mode in the related technology is poor in scheme applicability due to the fact that the data authorization mode is only applicable to a single-party authorization scene is solved, the applicability of the data authorization scheme is improved, and the security of data authorization is improved.
In the technical solution provided in step S202, a first authorization request initiated by a client is received, where the first authorization request is used to request authorization of data to be authorized.
In the related art, data authorization may be performed in a single-party authorization manner. Taking the resource to be authorized as the digital certificate as an example, as shown in fig. 3, the flow of the single-party authorization method includes the following steps:
step S302, an authorization request is initiated.
A client or other device may initiate an authorization request for a digital voucher requesting authorization of the digital voucher to object a (e.g., granting usage rights, etc.).
In step S304, the digital voucher owner/supervisor/administrator/other third party receives the authorization request.
The digital voucher owner, supervisor, authority, or other third party may receive the authorization request as an authorizer.
Step S306, judging whether authorization is available.
The authorizer may determine whether to authorize the digital voucher to subject a, and if so, perform step S308, otherwise, perform step S310.
Step S308, authorization is successful.
And the authorizing party judges that the digital certificate is authorized to the object A, the authorization is successful, and an authorization success indication is returned to the client.
And step S310, refuting.
The authorizer determines not to authorize the digital certificate to the object A, fails the authorization, rejects the authorization request, and returns an authorization failure indication to the client.
The data authorization method in this embodiment may be applied to a scenario of performing multi-party joint authorization on data to be authorized (e.g., private data and digital credentials). For example, in a digital credential authorization scenario, a joint authorization mechanism/scheme may be configured on the basis of a single-party authorization mechanism/scheme to satisfy the application scenario of joint authorization.
The data to be authorized may be private data, digital assets, digital certificates, etc. For example, the data to be authorized may be: identification cards, driving licenses, deposit certificates, prescriptions, graduation certificates, academic certificates, house property cards, network transaction records, and the like.
The user can use the client to authorize the data to be authorized. On the interface of the client, the user can input the related information of the data to be authorized so as to authorize the data to be authorized. The related information can be input through an input box or obtained by identifying the uploaded image of the data to be authorized. The relevant information entered may include, but is not limited to, at least one of: the target data identification of the data to be authorized, the target data name of the data to be authorized, the generation date of the data to be authorized (e.g., the ownership generation date), and the like.
After the relevant information of the input data to be authorized is acquired, the client may generate a first authorization request, where the first authorization request is used to request authorization of the data to be authorized, and send the first authorization request to a server or other control devices for authorization control. In this embodiment, a server is taken as an example for description, and the data authorization method in this embodiment is also applicable to other similar devices.
In the technical solution provided in step S204, in response to the first authorization request, a plurality of reference authorization results of a plurality of authorization parties are obtained, where each authorization party of the plurality of authorization parties is configured to authorize data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one.
After receiving the first authorization request, the server may obtain a plurality of reference authorization results for a plurality of authorizers. Each of the plurality of authorizers is configured to authorize data to be authorized, that is, a plurality of federated authorizers, which may include, but are not limited to, at least one of: the authority of the data to be authorized belongs to a relationship person, a supervision party, a management organization, a system operator and the like.
The multi-party joint authorization scenario may be various and may include, but is not limited to, one of the following:
1) when the ownership of the data and digital certificate is multiparty, the association authorization of all the ownership is needed;
2) when the ownership of the data and digital certificate is a single party, the ownership needs to be jointly authorized by a third party;
3) and when the ownership relationship of the data and the digital certificate is a plurality of parties, the ownership relationship is subject to combined authorization of the parties and a third party.
The third party may be a single party or a plurality of parties, and may include but is not limited to at least one of the following: a supervisor, a management authority, a system operator, etc. Different data to be authorized (e.g., privacy data, digital certificates), the corresponding third parties may be the same or different. Multiple authorized parties in the joint authorization scenario may be configured as needed, which is not limited in this embodiment.
The multiple authorizers correspond to the multiple reference authorization results one by one, that is, each authorizer returns one reference authorization result. The reference authorization result of each authorizer can be used to indicate the authorization result of the authorizer for the data to be authorized. Different authorization scenarios may have different corresponding authorization results.
For example, a first authorization request is sent by a first object, the first authorization request is used for requesting to determine whether to authorize data to be authorized to a second object, and the corresponding authorization result is used for indicating whether to authorize the data to be authorized to the second object.
It should be noted that, the sending authorization request, the receiving authorization request, and each authorization party may be a node in the distributed identity system, for example, a member node on a federation chain of the same federation, a member node on a federation chain within the same group, or a member node on an open federation chain, and an architecture of the distributed identity system may be configured as needed, which is not specifically limited in this embodiment.
In the technical solution provided in step S206, first indication information is sent to the client, where the first indication information is used to indicate an authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
According to the multiple reference authorization results, the authorization result of the data to be authorized can be determined. That is, the joint authorization result of multiple authorizers for the data to be authorized. The joint authorization result may be used to indicate whether to authorize the data to be authorized to a particular object (e.g., a second object).
The server can generate first indication information based on the joint authorization result, wherein the first indication information is used for representing the joint authorization result, and the first indication information is returned to the client side so as to display the first indication information through the client side.
As an optional embodiment, after receiving the first authorization request initiated by the client, the method further includes:
s11, carrying out validity check on the data to be authorized, and obtaining the check result of the data to be authorized;
and S12, sending second indication information to the client under the condition that the verification result is used for indicating that the data to be authorized is not verified, wherein the second indication information is used for indicating that the data to be authorized is not verified.
After receiving the first authorization request, the server may first perform validity check on the data to be authorized, determine whether the first authorization request is valid, for example, whether the first authorization request conforms to a data rule of the data type, whether an object applying for authorization is an object that allows the authorization request on the data to be authorized, and obtain a check result of the authorization data.
If the verification result is used for indicating that the data to be authorized is not verified, it can be determined that the data to be authorized is illegal, and the server can send second indication information to the client, where the second indication information is used for indicating that the data to be authorized is not verified. After receiving the second indication information, the client may display a prompt message on a display interface thereof to prompt that the data to be authorized fails to be checked.
If the verification result is used for indicating that the data to be authorized passes the verification, a plurality of reference authorization results of a plurality of authorized parties can be further obtained. In addition, the data to be authorized can also be directly sent to a plurality of authorized parties for authorization judgment, and validity check and the like can be determined by each authorized party.
It should be noted that, one data identifier and an authorizer may be in a one-to-many relationship (each data identifier corresponds to a specific plurality of authorizers), and the process of determining the corresponding authorizer may be regarded as a process of validity check; or a many-to-many relationship (multiple data identifications correspond to multiple authorized parties), and validity check can be performed before determining the corresponding authorized parties.
According to the embodiment, the legality of the data to be authorized is ensured by firstly carrying out the legality check on the data to be authorized, the operation executed by an authorized party can be reduced, and the network data transmission burden is reduced.
As an optional embodiment, before obtaining the multiple reference authorization results of the multiple authorizers, the method further includes:
s21, extracting the target data name of the data to be authorized and the target data identification of the data to be authorized from the first authorization request;
and S22, determining a plurality of authorized parties according to the target data name and the target data identification.
The first authorization request may carry a name of target data of the data to be authorized and a target data identifier of the data to be authorized, and may also carry a generation date, an authorization date, an issuance date, and the like of the data to be authorized, and different information may be written into different fields of the first authorization request.
The server can extract the target data name and the target data identifier in the first authorization request, and determine a plurality of authorizers (a plurality of authorizers) of the data to be authorized according to the target data name and the target data identifier.
For example, the data to be authorized may be a property certificate with multiple owners, and the first authorization request may carry an identifier of the property certificate (for identifying that the request is authorized to be the property certificate) and a property certificate number. According to the identification of the property certificate and the property certificate number, a plurality of authorized parties of the property certificate can be determined, and the plurality of authorized parties can comprise: multiple owners, the house-administration, etc.
It should be noted that, multiple authorized parties may also be determined only according to the data identifier of the data to be authorized, or multiple authorized parties may be determined in other manners. And determining a plurality of authorized parties according to the target data name and the target data identifier, and authorizing a plurality of types of data to be authorized by using the same system, thereby improving the applicability of the authorization scheme.
According to the method and the device for determining the authorization schemes, the multiple authorization parties are determined based on the data names and the data identifications, the accuracy of determining the authorization parties can be guaranteed, and the applicability of the authorization schemes is improved.
As an alternative embodiment, determining the plurality of authorized parties according to the target data name and the target data identifier includes:
and S31, matching a plurality of authorized parties from a target relational database by using the target data name and the target data identifier, wherein the target relational database stores the corresponding relationship among the data name, the data identifier and the authorized parties.
In order to improve the efficiency of determining the authorized party, a target relational database may be configured in advance, and the target relational database may store corresponding relationships between data names, data identifiers and the authorized party of different data. The target relation library may store a plurality of target relation tables, each corresponding to a data type, for storing a corresponding relation between a data identifier of the data type and an authorized party.
For example, for the academic degree certificate and the house property certificate, different target relationship tables can be used to respectively store the corresponding relationship between the academic degree certificate number and the authorizing party and the corresponding relationship between the house property certificate number and the authorizing party.
The server may match multiple authorized parties from the target relational library using the target data name and the target data identification. The target relational database may be a database local to the server or a database communicatively connected to the server via a network.
The server can firstly use the target data name to determine a target relation table matched with the target data name in a target relation library; then, the multiple authorized parties are matched out from the target relation table by using the target data identification.
By the embodiment, the determining efficiency of the authorizer can be improved by matching the authorizer of the data to be authorized from the target relational database.
As an alternative embodiment, obtaining a plurality of reference authorization results of a plurality of authorizers includes:
s41, respectively sending a second authorization request to each of the multiple authorizers, wherein the second authorization request is used for requesting authorization to the data to be authorized;
and S42, respectively receiving the reference authorization result returned by each of the plurality of authorizers.
Each authorizing party may correspond to an authorizing node, which may be a network node, e.g., a server, a terminal device, or other device, etc. After receiving the first authorization request, the server may send a second authorization request to each of the plurality of authorizers, e.g., to an authorization node corresponding to each authorizer.
The second authorization request is used for requesting authorization of the data to be authorized, and may be the forwarded first authorization request or an authorization request regenerated according to the information carried in the first authorization request. The generation manner of the second authorization request may be set as required, which is not limited in this embodiment.
For an authorizer, after receiving the second authorization request, the authorizer may authorize the data to be authorized, for example, authorize the data to be authorized according to the target data identifier carried in the second authorization request, and obtain a reference authorization result. After obtaining the refer authorization request, the authorizer may return a refer authorization result to the server. The server can respectively receive the reference authorization results returned by the authorization parties.
According to the embodiment, the authorization results of a plurality of authorization parties are obtained by sending authorization requests to the authorization parties, so that the method is applicable to a distributed network architecture, data authorization in a cross-platform scene is realized, and the accuracy of the authorization results can be ensured.
As an optional embodiment, before sending the first indication information to the client, the method further includes:
s51, determining the authorization result of the data to be authorized according to the multiple reference authorization results;
s52, according to the authorization result of the data to be authorized, generating the first indication information.
To obtain the first indication information, joint authorization results of multiple authorizers may first be determined. If there are multiple authorized parties, the server can obtain the reference authorization result of each authorized party, and determine the authorization result of the data to be authorized according to the multiple reference authorization results, for example, synthesize the multiple reference authorization results to obtain a combined authorization result.
The joint authorization result may be a combination of multiple reference authorization results based on a previously agreed consensus or agreed rule. According to the joint authorization result, indication information of the joint authorization result, i.e., first indication information, may be generated.
According to the embodiment, the combined authorization result is obtained by fusing the authorization results of the multiple authorization parties, and the indication information of the combined authorization result is generated, so that the method and the device are suitable for various authorization scenes, and the accuracy of combined authorization is improved.
As an optional implementation manner, determining the authorization result of the data to be authorized according to the plurality of reference authorization results includes:
s61, determining a first authorization result of the data to be authorized when the multiple reference authorization results all indicate that authorization of the data to be authorized is allowed, wherein the first authorization result is used for indicating that the authorization of the data to be authorized is successful.
If the authorization results of the data to be authorized, which are represented by the multiple reference authorization results, are the same and are all allowed to be authorized, it can be determined that the data to be authorized is allowed to be authorized. The server can determine a first authorization result of the data to be authorized, wherein the first authorization result is used for indicating that a rights object of the data to be authorized is a first object.
For example, there are multiple authorizers for data to be authorized: if the authorization results of all the authorization parties agree to authorization, the joint authorization result is used for indicating that the data to be authorized passes authorization and allowing the data to be authorized (for example, the right person of the data to be authorized is a second object).
As another optional implementation manner, determining the authorization result of the data to be authorized according to the multiple reference authorization results includes:
s62, determining a second authorization result of the data to be authorized under the condition that at least one reference authorization result in the plurality of reference authorization results indicates that the data to be authorized is not allowed to be authorized, wherein the second authorization result is used for indicating that the data to be authorized fails to be authorized.
The joint authorization rule may be: each party must authorize it to pass. If the multiple reference authorization results do not all pass the authorization, the authorization of the data to be authorized can be determined to fail, and a second authorization result of the data to be authorized can be determined, wherein the second authorization result is used for indicating that the authorization of the data to be authorized fails.
The at least one reference authorization result indicates that authorization of the data to be authorized is not allowed, for example, each reference authorization result is used to indicate whether authorization of the data to be authorized is allowed, but some of the reference authorization results indicate that authorization of the data to be authorized is not allowed, for example, some reference authorization results are used to indicate whether authorization of the data to be authorized is allowed, and another reference authorization result is used to indicate that it cannot be determined whether authorization of the data to be authorized is allowed, that is, it is not an authorizer of the data to be authorized, or other similar scenarios may also be used.
For example, there are multiple authorizers for data to be authorized: if the authorization results of the authority relationship person, the supervision party and the system operation party of the data to be authorized are as follows: authorization is allowed, and the authorization result of the management organization is as follows: if the authorization is not allowed, the joint authorization result is used for indicating that the authorization to the data to be authorized fails.
As another optional implementation manner, determining the authorization result of the data to be authorized according to the multiple reference authorization results includes:
s63, under the condition that at least one reference authorization result in the multiple reference authorization results indicates that the data to be authorized is not allowed to be authorized, calculating the authorization probability of the data to be authorized according to the multiple reference authorization results and the weight corresponding to each authorization party in the multiple authorization parties, wherein the authorization probability is the probability that the data to be authorized is allowed to be authorized;
s64, determining a third authorization result of the data to be authorized under the condition that the authorization probability is greater than or equal to the target probability threshold, wherein the third authorization result is used for indicating that the authorization of the data to be authorized is successful;
s65, determining a fourth authorization result of the data to be authorized under the condition that the authorization probability is smaller than the target probability threshold, wherein the fourth authorization result is used for indicating that the authorization of the data to be authorized fails.
The joint authorization rule may be: it is determined by weight whether the authorization was successful. If the multiple reference authorization results do not all pass the authorization, the server may calculate an authorization probability with the data to be authorized according to the multiple reference authorization results and the weight corresponding to each of the multiple authorization parties, where the authorization probability is a probability of authorization performed on the data to be authorized.
The probabilities for different authorities may be the same (e.g., same share and same weight, 1 person and 1 ticket, same weight for each ticket) or different (e.g., different share and weight, ticket count by weight). In obtaining the reference authorization result of each authorizer, voting can be performed based on the reference authorization result, and the number of tickets authorized to pass (authorization probability) is calculated according to the weight. The ticket number may be normalized probability or non-normalized probability, and the manner of calculating the authorization probability according to the weight of the authorizer may be set as needed, which is not limited in this embodiment.
After the authorization probability is obtained, the authorization probability may be compared to a target probability threshold. If the reference probability is greater than or equal to the target probability threshold, it can be determined that the data to be authorized is authorized to pass. The server may determine a third authorization result of the data to be authorized, where the third authorization result is used to indicate that the data to be authorized is successfully authorized. If the authorization probability is smaller than the target probability threshold, the data to be authorized can be judged to be not authorized. The server may determine a fourth authorization result of the data to be authorized, where the fourth authorization result is used to indicate that the data to be authorized fails to be authorized.
For example, there are multiple authorizers for data to be authorized: the authority of the data to be authorized belongs to a relationship person (weight 0.1), a supervision party (weight 0.4), a management mechanism (weight 0.4), and a system operation party (weight 0.1), if the authority of the relationship person, the supervision party and the management mechanism of the data to be authorized has the following authorization results: and the authorization result of the system operator is as follows: the authorization fails. The reference probability of passing the authorization obtained by calculation is 0.9 and is greater than the probability threshold value 0.8 (the target probability threshold value can be configured as required), and then the joint authorization result is used for indicating that the authorization of the data to be authorized is successful.
By the embodiment, whether the data to be authorized is determined by configuring different authorization rules, so that the applicability and flexibility of a data authorization mode can be improved.
It should be noted that, in this embodiment, in order to ensure the security and efficiency of information transmission, the information carried in the authorization request may be encrypted, or the authorization request carries a feature value of the data to be authorized, and the like. The types and authorization scenarios of the data to be authorized are optional examples, and the data authorization scheme in the embodiment is applicable to other types of data to be authorized and authorization scenarios.
The following explains a data authorization method in the embodiment of the present application with reference to an alternative example. The data authorization scenario in this example applies to an authorization scenario of private data protection and digital certificate management, where data to be authorized is a digital certificate (and private data is similar thereto), an authorization request is used to request that the digital certificate be authorized to an object B (so that the object B has a ownership relationship with the digital certificate, or so that the object B has a right to perform some operation using the digital certificate), and an authorizer includes: the digital certificate authority (authority 1, authority 2, …, authority N), and the third party (supervisor, management structure, system operator), wherein the authority refers to the person, organization, etc. having authority with the digital certificate authority. The ownership owner may be an ownership of the digital certificate, or may be another type of ownership owner, for example, the digital certificate is a transaction certificate, and the ownership owner may be a transaction partner.
As shown in fig. 4, the flow of the data authorization method in this example includes the following steps:
step S402, an authorization request is initiated.
A client or other device may initiate an authorization request for a digital voucher requesting authorization of the digital voucher to object B.
In step S404, a plurality of authorized parties respectively receive the authorization requests.
The server, upon receiving the authorization request, may determine a plurality of authorized parties to the digital voucher, including: the digital certificate authority 1, the digital certificate authority 2, …, the digital certificate authority N, the third party 1 (supervisor), the third party 2 (management structure), the third party 3 (system operator), and forwards the authorization request to each of the authorizers.
Step S406, determine whether the right is available.
Each authorizer can determine whether to authorize the digital voucher, and if all authorizers are authorized, perform step S408, otherwise perform step S410.
In step S408, the authorization is successful.
And each authorizing party authorizes and returns an authorization success indication to the client side after authorization is successful.
And step S410, refuting.
If any authorization party does not authorize, the authorization fails, the authorization request is rejected, and an authorization failure indication is returned to the client.
It should be noted that, based on the authorization rule agreed upon based on the consensus agreed upon in advance, the optional authorization rules may include, but are not limited to, the following:
1) share same weight (1 person 1 ticket, each ticket has the same weight);
2) different weights (ticket number is calculated according to weight size) of different stocks;
3) each party must authorize it as pass;
4) any party 1 authorizes as pass;
5) any number of parties (less than the total number of parties) are authorized as a pass.
By the example, on the basis of the single-party authorization mechanism/scheme, a combined authorization mechanism/scheme is created to meet the application scene of combined authorization, so that the method can be applied to various combined authorization scenes, the applicability of the data authorization scheme is improved, and the accuracy of the authorization result is ensured.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
According to another aspect of the embodiments of the present application, there is also provided a data authorization apparatus for implementing the data authorization method. Fig. 5 is a schematic diagram of an alternative data authorization apparatus according to an embodiment of the present application, and as shown in fig. 5, the apparatus may include:
(1) a receiving unit 52, configured to receive a first authorization request initiated by a client, where the first authorization request is used to request to authorize data to be authorized; (ii) a
(2) An obtaining unit 54, connected to the receiving unit 52, configured to obtain, in response to the first authorization request, multiple reference authorization results of multiple authorization parties, where each authorization party in the multiple authorization parties is configured to authorize the data to be authorized, and the multiple authorization parties correspond to the multiple reference authorization results one to one;
(3) a first sending unit 56, connected to the obtaining unit 54, configured to send first indication information to the client, where the first indication information is used to indicate an authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
It should be noted that the receiving unit 52 in this embodiment may be configured to execute the step S202, the obtaining unit 54 in this embodiment may be configured to execute the step S204, and the first sending unit 56 in this embodiment may be configured to execute the step S206.
Receiving a first authorization request initiated by a client through the module, wherein the first authorization request is used for requesting authorization of data to be authorized; responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one; the first indication information is sent to the client, wherein the first indication information is used for indicating the authorization result of the data to be authorized, which is determined according to the multiple reference authorization results, so that the problem that the data authorization mode in the related technology is poor in scheme applicability due to the fact that the data authorization mode is only applicable to a single-party authorization scene is solved, the applicability of the data authorization scheme is improved, and the security of data authorization is improved.
As an alternative embodiment, the apparatus further comprises:
the extracting unit is used for extracting the target data name of the data to be authorized and the target data identification of the data to be authorized from the first authorization request before acquiring a plurality of reference authorization results of a plurality of authorization parties;
and the first determining unit is used for determining a plurality of authorized parties according to the target data name and the target data identifier.
As an alternative embodiment, the first determination unit includes:
and the matching module is used for matching a plurality of authorized parties from the target relational database by using the target data name and the target data identifier, wherein the target relational database stores the corresponding relationship among the data name, the data identifier and the authorized parties.
As an alternative embodiment, the obtaining unit includes:
the sending module is used for respectively sending a second authorization request to each of the multiple authorizers, wherein the second authorization request is used for requesting authorization to the data to be authorized;
and the receiving module is used for respectively receiving the reference authorization result returned by each of the plurality of authorization parties.
As an alternative embodiment, the apparatus further comprises:
the second determining unit is used for determining the authorization result of the data to be authorized according to the multiple reference authorization results before the first indication information is sent to the client;
and the generating unit is used for generating first indication information according to the authorization result of the data to be authorized.
As an alternative embodiment, the second determination unit comprises at least one of:
the first determining module is used for determining a first authorization result of the data to be authorized under the condition that the multiple reference authorization results all represent that the data to be authorized is allowed to be authorized, wherein the first authorization result is used for representing that the data to be authorized is successfully authorized;
the second determining module is used for determining a second authorization result of the data to be authorized under the condition that at least one reference authorization result in the plurality of reference authorization results indicates that the data to be authorized is not allowed to be authorized, wherein the second authorization result is used for indicating that the data to be authorized fails to be authorized;
the calculation module is used for calculating the authorization probability of the data to be authorized according to the multiple reference authorization results and the weight corresponding to each of the multiple authorization parties under the condition that at least one reference authorization result in the multiple reference authorization results does not allow the data to be authorized, wherein the authorization probability is the probability of allowing the data to be authorized; the third determining module is used for determining a third authorization result of the data to be authorized under the condition that the authorization probability is greater than or equal to the target probability threshold, wherein the third authorization result is used for indicating that the authorization of the data to be authorized is successful; and the fourth determining module is used for determining a fourth authorization result of the data to be authorized under the condition that the authorization probability is smaller than the target probability threshold, wherein the fourth authorization result is used for indicating that the authorization of the data to be authorized fails.
As an alternative embodiment, the apparatus further comprises:
the verification unit is used for carrying out validity verification on the data to be authorized after receiving the first authorization request initiated by the client and obtaining a verification result of the data to be authorized;
and the second sending unit is used for sending second indication information to the client under the condition that the verification result is used for indicating that the data to be authorized is not verified, wherein the second indication information is used for indicating that the data to be authorized is not verified.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may be operated in a hardware environment as shown in fig. 1, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to another aspect of the embodiments of the present application, there is also provided an electronic device for implementing the above data authorization method, where the electronic device may be a server, a terminal, or a combination thereof.
Fig. 6 is a block diagram of an alternative electronic device according to an embodiment of the present application, and as shown in fig. 6, the electronic device includes a memory 602 and a processor 604, the memory 602 stores a computer program, and the processor 604 is configured to execute steps in any one of the method embodiments described above through the computer program.
Optionally, in this embodiment, the electronic apparatus may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, receiving a first authorization request initiated by a client, wherein the first authorization request is used for requesting authorization of data to be authorized;
s2, responding to the first authorization request, obtaining a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing the data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one;
and S3, sending first indication information to the client, wherein the first indication information is used for indicating the authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
Alternatively, it can be understood by those skilled in the art that the structure shown in fig. 6 is only an illustration, and the electronic device may also be a terminal device such as a smart device (e.g., an Android Mobile phone, an iOS Mobile phone, etc.), a tablet computer, a palmtop computer, and an MID (Mobile Internet Devices), a PAD, etc. Fig. 6 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 6, or have a different configuration than shown in FIG. 6.
The memory 602 may be used to store software programs and modules, such as program instructions/modules corresponding to the data authorization method and apparatus in the embodiments of the present application, and the processor 604 executes various functional applications and data processing by running the software programs and modules stored in the memory 602, that is, implementing the data authorization method described above. The memory 602 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 602 may further include memory located remotely from the processor 604, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The memory 602 may be, but is not limited to, specifically configured to store data change record information of one or more objects.
As an example, as shown in fig. 6, the memory 602 may include, but is not limited to, the receiving unit 52, the obtaining unit 54, and the first sending unit 56 in the data authorization apparatus. In addition, other module units in the data authorization apparatus may also be included, but are not limited to, and are not described in this example again.
Optionally, the transmitting device 606 is used for receiving or sending data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 606 includes a NIC (Network Interface Controller) that can be connected to a router via a Network cable and other Network devices so as to communicate with the internet or a local area Network. In one example, the transmission device 606 is an RF (Radio Frequency) module, which is used for communicating with the internet in a wireless manner.
Furthermore, the electronic device may further include: a connection bus 608 for connecting the respective module components in the electronic apparatus.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, ROM (Read-Only Memory), RAM (Random Access Memory), magnetic or optical disks, and the like.
According to still another aspect of an embodiment of the present application, there is also provided a storage medium. Alternatively, in this embodiment, the storage medium may be a program code for executing the data authorization method.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
s1, receiving a first authorization request initiated by a client, wherein the first authorization request is used for requesting authorization of data to be authorized;
s2, responding to the first authorization request, obtaining a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing the data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one;
and S3, sending first indication information to the client, wherein the first indication information is used for indicating the authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
Optionally, the specific example in this embodiment may refer to the example described in the above embodiment, which is not described again in this embodiment.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing program codes, such as a U disk, a ROM, a RAM, a removable hard disk, a magnetic disk, or an optical disk.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution provided in the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. A method for authorizing data, comprising:
receiving a first authorization request initiated by a client, wherein the first authorization request is used for requesting authorization to data to be authorized;
responding to the first authorization request, and acquiring a plurality of reference authorization results of a plurality of authorization parties, wherein each authorization party in the plurality of authorization parties is used for authorizing the data to be authorized, and the plurality of authorization parties correspond to the plurality of reference authorization results one to one;
and sending first indication information to the client, wherein the first indication information is used for indicating an authorization result of the data to be authorized, which is determined according to the multiple reference authorization results.
2. The method of claim 1, wherein prior to said obtaining a plurality of reference authorization results for a plurality of authorizers, the method further comprises:
extracting a target data name of the data to be authorized and a target data identifier of the data to be authorized from the first authorization request;
and determining the multiple authorized parties according to the target data name and the target data identifier.
3. The method of claim 2, wherein said determining the plurality of authorized parties based on the target data name and the target data identification comprises:
and matching the multiple authorized parties from a target relational database by using the target data name and the target data identifier, wherein the target relational database stores the corresponding relationship among the data name, the data identifier and the authorized parties.
4. The method of claim 1, wherein obtaining the plurality of reference authorization results of the plurality of authorizers comprises:
respectively sending a second authorization request to each of the multiple authorizers, wherein the second authorization request is used for requesting authorization to the data to be authorized;
and respectively receiving the reference authorization result returned by each of the multiple authorizers.
5. The method of claim 1, wherein prior to the sending the first indication information to the client, the method further comprises:
determining an authorization result of the data to be authorized according to the multiple reference authorization results;
and generating the first indication information according to the authorization result of the data to be authorized.
6. The method according to claim 5, wherein the determining the authorization result of the data to be authorized according to the plurality of reference authorization results comprises at least one of:
determining a first authorization result of the data to be authorized under the condition that the reference authorization results all represent that the data to be authorized is allowed to be authorized, wherein the first authorization result is used for representing that the data to be authorized is successfully authorized;
determining a second authorization result of the data to be authorized under the condition that at least one reference authorization result in the plurality of reference authorization results indicates that the data to be authorized is not allowed to be authorized, wherein the second authorization result is used for indicating that the data to be authorized fails to be authorized;
under the condition that at least one reference authorization result in the plurality of reference authorization results indicates that the data to be authorized is not allowed to be authorized, calculating an authorization probability with the data to be authorized according to the plurality of reference authorization results and a weight corresponding to each authorizing party in the plurality of authorizing parties, wherein the authorization probability is a probability that the data to be authorized is allowed to be authorized; determining a third authorization result of the data to be authorized under the condition that the authorization probability is greater than or equal to a target probability threshold, wherein the third authorization result is used for indicating that the authorization of the data to be authorized is successful; and determining a fourth authorization result of the data to be authorized under the condition that the authorization probability is smaller than a target probability threshold, wherein the fourth authorization result is used for indicating that the data to be authorized fails to be authorized.
7. The method according to any of claims 1 to 6, wherein after receiving a first authorization request initiated by a client, the method further comprises:
carrying out validity check on the data to be authorized, and obtaining a check result of the data to be authorized;
and sending second indication information to the client under the condition that the verification result is used for indicating that the data to be authorized is not verified, wherein the second indication information is used for indicating that the data to be authorized is not verified.
8. A data authorization apparatus, comprising:
the device comprises a receiving unit, a sending unit and a receiving unit, wherein the receiving unit is used for receiving a first authorization request initiated by a client, and the first authorization request is used for requesting authorization to data to be authorized;
an obtaining unit, configured to respond to the first authorization request, and obtain multiple reference authorization results of multiple authorizers, where each authorizer of the multiple authorizers is configured to authorize the data to be authorized, and the multiple authorizers correspond to the multiple reference authorization results one to one;
a first sending unit, configured to send first indication information to the client, where the first indication information is used to indicate an authorization result of the to-be-authorized data determined according to the multiple reference authorization results.
9. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to carry out the method of any one of claims 1 to 7 when executed.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 7 by means of the computer program.
CN202010676178.3A 2020-07-14 2020-07-14 Data authorization method and device, storage medium and electronic device Pending CN111931230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010676178.3A CN111931230A (en) 2020-07-14 2020-07-14 Data authorization method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010676178.3A CN111931230A (en) 2020-07-14 2020-07-14 Data authorization method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN111931230A true CN111931230A (en) 2020-11-13

Family

ID=73312931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010676178.3A Pending CN111931230A (en) 2020-07-14 2020-07-14 Data authorization method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN111931230A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488562A (en) * 2020-12-11 2021-03-12 北京金山云网络技术有限公司 Service implementation method and device
CN114978681A (en) * 2022-05-20 2022-08-30 中国工商银行股份有限公司 Service application authorization method and device based on block chain and processor

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330813A (en) * 2015-06-16 2017-01-11 华为技术有限公司 Method, device and system for processing authorization
CN109768969A (en) * 2018-12-20 2019-05-17 深圳市元征科技股份有限公司 Authority control method and internet-of-things terminal, electronic equipment
CN111131336A (en) * 2020-03-30 2020-05-08 腾讯科技(深圳)有限公司 Resource access method, device, equipment and storage medium under multi-party authorization scene

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330813A (en) * 2015-06-16 2017-01-11 华为技术有限公司 Method, device and system for processing authorization
CN109768969A (en) * 2018-12-20 2019-05-17 深圳市元征科技股份有限公司 Authority control method and internet-of-things terminal, electronic equipment
CN111131336A (en) * 2020-03-30 2020-05-08 腾讯科技(深圳)有限公司 Resource access method, device, equipment and storage medium under multi-party authorization scene

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488562A (en) * 2020-12-11 2021-03-12 北京金山云网络技术有限公司 Service implementation method and device
CN112488562B (en) * 2020-12-11 2024-06-07 北京金山云网络技术有限公司 Service realization method and device
CN114978681A (en) * 2022-05-20 2022-08-30 中国工商银行股份有限公司 Service application authorization method and device based on block chain and processor
CN114978681B (en) * 2022-05-20 2024-01-30 中国工商银行股份有限公司 Service application authorization method and device based on block chain and processor

Similar Documents

Publication Publication Date Title
CN111492634A (en) Secure and confidential custody transaction systems, methods, and apparatus using zero-knowledge protocols
CN112789823B (en) Block chain-based competitive election network system and competitive election method
US10410213B2 (en) Encapsulated security tokens for electronic transactions
CN110490610B (en) Community management system based on block chain
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
JP2019053269A (en) System and method for determining ballot of voter collected by electronic voting
CN111552955A (en) Personal identity authentication method and device based on block chain and IPFS
EP3376708A1 (en) Anonymous communication system and method for subscribing to said communication system
US20220021528A1 (en) Secure storage techniques utilizing consortium distributed ledgers
CN109768983A (en) Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain
CN103220141B (en) A kind of protecting sensitive data method and system based on group key strategy
CN109714169B (en) Data credible circulation platform based on strict authorization and circulation method thereof
CN112291062B (en) Voting method and device based on block chain
CN111934881B (en) Data right determining method and device, storage medium and electronic device
CN115688191A (en) Block chain-based electronic signature system and method
CN112434334A (en) Data processing method, device, equipment and storage medium
CN113221191B (en) Block chain-based data evidence storage method, device, equipment and storage medium
CN108881121A (en) A kind of P2P credit based on mobile Internet mutually sees system and method
CN113706261A (en) Block chain-based power transaction method, device and system
CN111931230A (en) Data authorization method and device, storage medium and electronic device
KR102450412B1 (en) SLA-Based Sharing Economy Service with Smart Contract for Resource Integrity in the Internet of Things
EP4254234A1 (en) Digital credential issuing for an entity
CN109600338B (en) Trusted identity management service method and system
CN110492997A (en) A kind of encryption system based on super account book, method, apparatus and storage medium
CN112036884B (en) Signature method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination